An Information Security Maturity Evaluation Mode
نویسندگان
چکیده
منابع مشابه
A cyclical evaluation model of information security maturity
! ABSTRACT Purpose The lack of a security evaluation method might expose organizations to several risky situations. This paper aims at presenting a cyclical evaluation model of information security maturity. Design/methodology/approach This model was developed through the definition of a set of steps to be followed in order to obtain periodical evaluation of maturity and continuous improvement ...
متن کاملTowards maturity of information security maturity criteria: six lessons learned from software maturity criteria
Traditionally , information security management standards listing generic means of protection have received a lot of attention in the field of information security management. In the background a few information security management-oriente d maturity criteria have been laid down. These criteria can be regarded as the latest promising innovations on the information security checklist standard fa...
متن کاملIsfam: the Information Security Focus Area Maturity Model
Information security is mainly a topic that is considered to be information technology related. However, to successfully implement information security, an organization’s information security program should reflect the business strategy. Nowadays information security is in many companies enforced by the information technology department, based on what they think should be in place to protect th...
متن کاملSecurity Evaluation supported by Information Security Mechanisms
Information security plays a key role in protection of organization’s assets. There exist a number of standards and guidelines providing huge lists of security controls that, if properly used, might be useful against cyber threats. However, these standards leave the process of controls selection to the organizations. Security manager has to carry out a decision on implementation of security con...
متن کاملInformation Security Maturity as an Integral Part of ISMS based Risk Management Tools
Measuring the continuous improvement of Information Security Management Systems (ISMS) is often neglected as most organizations do not know how to extract keyindicators that could be used for this purpose. The underlying work presents a six-level maturity model which can be fully integrated in a risk management tool and helps to define key indicators for measuring the improvement of an ISMS. Fu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Engineering
سال: 2011
ISSN: 1877-7058
DOI: 10.1016/j.proeng.2011.11.2652